First published: Mon Jan 09 2012(Updated: )
After installing the remote client from JON 3.0, the extracted root directory is world readable/writeable/executable (0777). Although the child directories are not world writeable, by the parent directory being left in a world writeable state, it is possible to modify directory and file attributes on the child contents to trick the user into executing malicious scripts or code. A local attacker could use this flaw to compromise a remote JON server, using the credentials stolen from a privileged JON user who is using the remote client CLI from a system the local attacker has access to.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Operations Network | <=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0032 is considered a moderate severity vulnerability due to the world readable/writeable/executable permissions on the extracted root directory.
To fix CVE-2012-0032, change the permissions of the extracted root directory from 0777 to a more secure setting, such as 0755.
CVE-2012-0032 affects Red Hat JBoss Operations Network version 3.0 and earlier.
The risks associated with CVE-2012-0032 include potential unauthorized modification of directory and file attributes due to world writeable permissions.
Yes, a patch addressing CVE-2012-0032 is available as part of the Red Hat security advisory RHSA-2012-0406.